FindArticles FindArticles
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
FindArticlesFindArticles
Font ResizerAa
Search
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
Follow US
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.
FindArticles > News > Technology

Google Says 48% Of 2025 Zero Days Hit Enterprises

Gregory Zuckerman
Last updated: March 5, 2026 7:15 pm
By Gregory Zuckerman
Technology
6 Min Read
SHARE

Google’s latest zero-day report delivers a stark message for corporate defenders: nearly half of all in-the-wild exploits the company tracked in 2025 hit enterprise technologies, with attackers zeroing in on the very appliances meant to safeguard networks. The finding underscores how the enterprise edge—firewalls, VPNs, and virtualization platforms—has become the fastest, most reliable path into high-value environments.

Enterprise Appliances Became Prime Targets

Google’s analysis attributes 48% of last year’s tracked zero-days to enterprise tech, and about half of those were in security and networking gear. Devices from Cisco and Fortinet, along with VPN and virtualization platforms from Ivanti and VMware, featured prominently. Each of these vendors has recently acknowledged real-world exploitation in customer environments, reinforcing that attackers are treating enterprise perimeter and infrastructure software as low-hanging fruit.

Table of Contents
  • Enterprise Appliances Became Prime Targets
  • Consumer Zero-Days Climb With Mobile In Focus
  • Why Perimeter Tech Keeps Getting Pwned So Often
  • What CISOs Should Do Now To Reduce Zero-Day Risk
A pie chart titled 2024 Attributed Zero-Day Exploitation showing the distribution of 34 zero-day exploits. The largest segment, 29.4%, is State-Sponsored Espionage, with 10 exploits attributed to the Peoples Republic of China (PRC), 5 to an unknown location, 3 to Russia, and 1 to South Korea. The next largest segment, 23.5%, is Commercial Surveillance Vendors (CSVs) with 8 exploits. Other segments include Non-State Financially Motivated (14.7%, 5 exploits), State Sponsored Espionage and Financially Motivated (14.7%, 5 exploits, North Korea), Other UNC Groups (14.7%, 4 exploits), and Non-State Financially Motivated Cluster Also Conducting Espionage (14.7%, 2 exploits, Russia).

The common playbook wasn’t exotic. Researchers cited familiar classes of flaws—input validation errors and incomplete authorization checks—that enable remote code execution or authentication bypass. These bugs are straightforward to weaponize and, once exploited, can provide privileged access without tripping endpoint defenses that rarely run on hardened appliances.

Google also pointed to business application stacks as an underappreciated zero-day risk. A notable example was the Clop extortion gang’s campaign against Oracle E-Business Suite customers, which exposed sensitive HR records and executive data at organizations including Harvard University, American Airlines’ Envoy subsidiary, and The Washington Post. The takeaway: not all enterprise zero-days live at the edge—highly customized, mission-critical apps can be just as lucrative for data theft.

Consumer Zero-Days Climb With Mobile In Focus

The remaining 52% of zero-days were tied to consumer and end-user products from vendors like Microsoft, Apple, and Google. Operating systems dominated those cases, with mobile platforms seeing a noticeable uptick year over year. That aligns with broader threat intelligence from groups such as Google’s Threat Analysis Group and Citizen Lab, which have tracked sustained targeting of iOS and Android users through sophisticated exploit chains.

Google said more zero-days in 2025 were linked to commercial surveillance vendors than to traditional state-backed espionage units. This marks a slow but steady shift in the marketplace for intrusion capabilities, where governments increasingly procure turnkey exploits and spyware from private companies rather than building them entirely in-house. Firms previously named by independent researchers—including NSO Group and Intellexa—illustrate how this industry professionalizes access to advanced mobile exploits.

Why Perimeter Tech Keeps Getting Pwned So Often

Three structural realities explain attackers’ fixation on enterprise appliances. First, exposure: firewalls, VPN concentrators, SASE gateways, and hypervisor management interfaces are internet-facing by design, shrinking the distance between a bug and a breach. Second, visibility: most organizations lack robust telemetry on these devices, giving intruders a quieter foothold than a compromised laptop or server would. Third, patching friction: maintenance windows, clustering complexity, and fear of downtime slow updates, handing well-funded adversaries a larger exploitation window.

A pie chart titled 2024 Attributed Zero-Day Exploitation showing 34 zero days, broken down by attribution. The largest segment, 29.4%, is State-Sponsored Espionage, with sub-segments for Peoples Republic of China (PRC), Unknown Location, South Korea, and Russia. Other segments include Commercial Surveillance Vendors (CSVs) at 23.5%, Non-State Financially Motivated at 14.7%, State Sponsored Espionage and Financially Motivated (North Korea) at 14.7%, Other UNC Groups at 14.7%, and Non-State Financially Motivated Cluster Also Conducting Espionage (Russia) at 14.7%.

Those dynamics mirror patterns reflected by the CISA Known Exploited Vulnerabilities catalog, which has logged a steady drumbeat of edge-device flaws—think Citrix NetScaler, Cisco ASA, Fortinet FortiOS, Ivanti Connect Secure, and Atlassian Confluence—routinely leveraged in mass exploitation. Ransomware groups have likewise hammered virtualized environments; the wave of ESXi targeting in recent years showed how one hypervisor-layer compromise can cascade across dozens or hundreds of workloads.

What CISOs Should Do Now To Reduce Zero-Day Risk

Inventory and exposure control come first. Maintain a current map of all internet-facing appliances and management interfaces, and eliminate unnecessary public access via dedicated admin networks and strong access controls. Place device management planes behind SSO and MFA, and restrict by source IP whenever possible.

Harden patch operations. Treat perimeter and virtualization updates as emergency-change candidates with predefined rollback plans. Subscribe to vendor advisories and prioritize fixes for issues flagged by CISA’s KEV list or by reputable threat intel teams. Where immediate patching is impractical, deploy virtual patching via WAFs or reverse proxies to mitigate known exploit paths.

Improve detection on “black box” devices. Centralize logs from firewalls, VPNs, and hypervisors; enable any available debug or audit features; and baseline normal device behavior to surface anomalies like unexpected processes, config changes, or egress patterns. Network-based detection and honeypot listeners on management ports can provide early warning of exploitation attempts.

Finally, pressure vendors. Demand clear SLAs for security updates, public software bills of materials where feasible, and timely mitigations for zero-days. Favor products with rapid update channels, secure-by-default configurations, and support for memory-safe components in new code. As Google’s findings make clear, appliances can no longer be treated as set-and-forget guardrails—they are high-priority software assets that must be engineered, monitored, and patched with the same rigor as any business-critical application.

Gregory Zuckerman
ByGregory Zuckerman
Gregory Zuckerman is a veteran investigative journalist and financial writer with decades of experience covering global markets, investment strategies, and the business personalities shaping them. His writing blends deep reporting with narrative storytelling to uncover the hidden forces behind financial trends and innovations. Over the years, Gregory’s work has earned industry recognition for bringing clarity to complex financial topics, and he continues to focus on long-form journalism that explores hedge funds, private equity, and high-stakes investing.
Latest News
How Faceless Video Is Transforming Digital Storytelling
Oracle Cloud ERP Outage Sparks Renewed Debate Over Vendor Lock-In Risks
Why Digital Privacy Has Become a Mainstream Concern for Everyday Users
The Business Case For A Single API Connection In Digital Entertainment
Why Skins and Custom Servers Make Minecraft Bedrock Feel More Alive
Why Server Quality Matters More Than You Think in Minecraft
Smart Protection for Modern Vehicles: A Guide to Extended Warranty Coverage
Making Divorce Easier with the Right Legal Support
What to Know Before Buying New Glasses
8 Key Features to Look for in a Modern Payroll Platform
How to Refinance a Motorcycle Loan
GDC 2026: AviaGames Driving Innovation in Skill-Based Mobile Gaming
FindArticles
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
  • Corrections Policy
  • Diversity & Inclusion Statement
  • Diversity in Our Team
  • Editorial Guidelines
  • Feedback & Editorial Contact Policy
FindArticles © 2025. All Rights Reserved.